Leaders TalkX: Securing the Digital Realm: Collaborative Strategies for Trust and Resilience
28 May 2024 09:30h - 10:00h
Table of contents
Disclaimer: This is not an official record of the session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed.
Knowledge Graph of Debate
Session report
Full session report
WSIS Forum Panel Discusses Collaborative Strategies for Securing the Digital Realm
At the World Summit on the Information Society (WSIS) forum, a panel titled “Leaders Talk 5, Securing the Digital Realm, Collaborative Strategies for Trust and Resilience,” moderated by Moira Whelan of the National Democratic Institute, convened to address the pressing challenges of cybersecurity and the collaborative efforts needed to foster trust and resilience in the digital sphere.
Preetam Maloor from the ITU presented a sobering comparison between the digital landscape in 2005 and 2024. He pointed out the exponential growth in internet users from 1 billion to 5.4 billion and the alarming 80% yearly increase in cyberattacks. Maloor highlighted the astronomical rise in cybercrime costs from $400 billion to $8 to $11 trillion and the evolution of cyber threats, including AI-driven and post-quantum challenges. Despite these daunting figures, he noted a positive trend in member states’ responses, with significant improvements in national cybersecurity standards and strategies.
Namibia’s Minister of Information and Communications Technology, Emma Theophilus, discussed the essential role of governments in cultivating trust with citizens to safeguard digital rights and interests. Reflecting on the trust deficit during the COVID-19 pandemic, she underscored the need for transparent communication and education to enable citizens to protect themselves online. Theophilus also described Namibia’s inclusive approach in developing legislative frameworks, such as data protection and cybercrime bills, through extensive stakeholder consultations.
Marash Dukaj, Montenegro’s Minister of Public Administration, explored the opportunities and hazards of artificial intelligence (AI). He outlined Montenegro’s strategy to harness AI, focusing on data openness, education, and investment in digitalisation and innovation. Dukaj emphasised the necessity for an innovative and efficient approach to tackle global challenges, including financial instability, political unrest, and climate change.
Dick Christophe Ng Sui Wa, Chairman of the Information and Communications Technologies Authority in Mauritius, spoke about the pivotal role of ICT regulators in ensuring confidence and security. He mentioned Mauritius’s innovative blockchain-based licence verification system and the importance of regulators being technologically informed to make decisions on emerging technologies. Ng Sui Wa also highlighted the delicate balance between regulation and innovation.
Jacek Oko, President of the Office of Electronic Communications in Poland, stressed the importance of knowledge acquisition, direct technical contact, and support for SMEs in ensuring network trust and resilience. He described Poland’s swift and successful response in providing network support for over a million Ukrainian refugees, demonstrating the country’s capacity for rapid adaptation in crises. Oko also highlighted Poland’s participation in R&D projects, such as the 5G tactics programme, aimed at securing 5G networks.
Dan Sjoblom, Director General of the Swedish Post and Telecom Authority, outlined efforts to combat spoofing and fraud, including blocking certain phone numbers and developing legally binding rules for telecom operators. Sjoblom mentioned PTS’s broader assignment from the government to map the use of electronic communication services in fraud and to propose comprehensive actions to prevent such attempts.
Andrew Sullivan, President and CEO of the Internet Society, highlighted collaborative initiatives like MANRS for routing security and the importance of peering and exchange points for network resilience. He emphasised the need for all networks to participate and depend on open protocols for security and reliability.
In conclusion, the panellists concurred on the need for multi-stakeholder cooperation and international collaboration to tackle cybersecurity challenges and ensure digital network resilience. They underscored the importance of empowering citizens and SMEs to protect themselves and contribute to a secure digital environment. The insights from the discussion are to be summarised and submitted to the WSIS chair, reinforcing the WSIS forum’s role in promoting collaboration and trust in the digital realm.
Session transcript
Moira Whelan:
I think we’re ready to go. My name is Moira Whalen. I am the Director of Democracy and Technology at the National Democratic Institute, an NGO based in Washington, DC. And I’m happy today to be moderating this panel. This is Leaders Talk 5, Securing the Digital Realm, Collaborative Strategies for Trust and Resilience. And with our panelists today, that will be especially true in the internet regulation and cybersecurity space as regulators, all of our panelists really like to make rules. So we will see if they can follow them, which is three minutes for each of our panelists will then be summarized at the end of the WSIS forum. So I’d like to start today with Preetam Mallur, who is the Head of Emerging Technologies at the ITU. Where is Preetam?
Preetam Maloor:
Thank you very much. And I’ll just hopefully take two minutes. And I’ll use some statistics to hopefully frame some of the key points. And I’ll contrast between 2005, when we had the summit, World Summit on Information Society, and the status right now. So 2005, only 1 billion people were online. Mobile phones were primarily used to make phone calls and text. Mobile payments were just starting out. And the cost of cyber crime to the global economy then was already $400 billion, and which is pretty significant for that time. And the threat vectors, even though sophisticated for that era, probably is very different from what we see right now. So fast forward to 2024, 5.4 billion people are online. The cyber attacks are increasing by 80% year on year. An attack happens every 36 seconds on the web. And the cost of cyber crime has also skyrocketed more than 20 times to $8 to $11 trillion. And that’s a significant increase. And clearly, with the growing dependence on digital, concerns about privacy, concerns about human rights, have all exponentially increased. And we’re seeing new waves of cyber threats, from AI-driven cyber threats to being ready for the, or at least scrambling to be ready for a post-quantum world. Resilience also includes not just your cyber security, but also when you’re looking at physical security of subsea cables, of satellite communications, of terrestrial communications. But what is also heartening in this story is that we are seeing an accelerated response from member states. Probably not fast enough, but at least there’s clear willingness to respond. Just as examples, we have the ITU Global Cyber Security Index and a few statistics. 128 countries in 2017 lacked standards at the national level. And now it’s declined to 88 countries. 110 countries didn’t have a national cyber security strategy 2017, 67 countries. So this tells us that cyber security is increasing in complexity, targets, technologies, but we are also seeing willingness of stakeholders to come together. And we believe that ITU as the Action Line C5 facilitator has had a facilitating role to play in this. Thank you.
Moira Whelan:
Thank you, Preetam, and thank you for the ITU’s leadership in this space. I now wanna turn to our panelists and start with Emma Theophilus, who is the Minister of Information and Communications Technology in Namibia. And I wanted to ask you, just to kick off our conversation, the subject of our panel here today is about trust. And what can governments do to help secure, to develop trust in securing the digital rights and interests of citizens?
Emma Inamutila Theofelus:
Thank you so much. And I’m very happy to discuss one government’s leading role in actually having citizens trust them to secure the digital rights and interests. And I think this has been a conversation, especially particularly in the last four years, coming from the COVID-19 pandemic, with a lot of trust was lost in governments because either certain strata of society felt governments didn’t communicate well enough, others felt the government didn’t react and respond good enough in times of crisis. And I think particularly even for issues around digital rights and securing people’s digital rights, there is some level of crisis because as Mr. Preetam just spoke about, the cybersecurity concerns are very quite high in many countries. In a country like Namibia, we experienced about 2.7 million cyber attacks per annum, which means there are a lot of people in society, whether it’s the ordinary citizen, businesses that have operations online who feel very unsecured where cybersecurity is concerned. So I feel the first thing is to develop a relationship of communication between the ordinary person and the government, the business community and the public sector. There has to be continuous communication, what government is grappling with, what interventions would like to put in place, how they want the citizens to respond to some of the initiatives they’re embarking on. There will be trial and error and people should feel confident that something is being done. Secondly, when that comes with education, the ordinary citizen doesn’t necessarily always know how to protect themselves online. They cannot tell between fake information and real information. They sometimes don’t know how to verify information that they get. There must be some level through the communication, some level of education, knowledge transfer on how they’re able to protect themselves before government can step in and redress if any damage was done in that instance. And I think thirdly, once that relationship has been put in place, there’s communication, there’s knowledge transfer, government needs to find a way to start allowing citizens to take that responsibility themselves because governments are unable to be in every corner to try to protect citizens against either cybersecurity risks or mitigate them in that instance. Sometimes they only are able to respond and after the fact when the damage has already been done. So to empower citizens to be at the forefront of that protection, for citizens to really feel like, one, there is some legislative strategies, policies put in place that they can lean on when that time comes. And in Namibia, we are developing our data protection bill and we took time to consult and we thought it was important. Same for our cybercrime bill, same for our cybersecurity strategy. Time to consult so that when we actually come up with the legislation together, it’s not only government that owns it, but everybody owns it. Thank you.
Moira Whelan:
Thank you very much. And I’d like to turn now to Marash Dukaj, who is the Minister of Public Administration of Montenegro. It is not a technology panel unless we talk about the emerging threat of artificial intelligence. And so I’d like to turn to you and ask what Montenegro, how you’re viewing the benefits and the risks of the emerging technology.
Marash Dukaj:
Thank you for this exciting question. First of all, their colleagues, ministers, ladies and gentlemen, I am very happy to be here. Artificial intelligence is becoming a key factor in the transformation of the entire global society at a time when we are facing a series of simultaneous crisis, financial instability, political unrest, climate change, migration, pandemic, as well as the aging of Western civilization require innovative and efficient approach in order to better analyze the current situation and create an environment for proactive response. New technologies, including artificial intelligence, give such a comprehensive process a chance. Artificial intelligence is rapidly transforming our lives, offering technological advances in learning, product and service designing and task automation. In 2024, AI, especially, generative AI has become a key component of everyday life. It contributed to improving productivity, spending up and improving work processes, both in the public administration and in the private sector. First of all, AI plays a key role in improving IT security through analyzes on large amounts of data to detect and prevent security threats. The prevent or present day, say, let risks management and ethical use of AI is a priority. Montenegro, for relatively small country, must not lag behind in the field of artificial intelligence and challenges such as an inefficient number of experts and finances must not remain an obstacle. With the right policies and strategies, Montenegro intends to become part of the global progress in managing artificial intelligence. This includes the promotion of data openness, big data, metadata cooperation with international partners, education, as well as increased investment in digitalization, innovation, motivation, IT stuff and attacking investment. Therefore, the next steps will be aimed at further establishing the inter-probability of the system, improving the quality of data and increasing the digital literacy of the entire society. And a formership requires the improvement of education through the integration of relevant IT topics, the creation of an environment that is attractive for digital nomads and IT companies. Also, it is important to establish sustainable links between the IT sector and within in the use of AI and other areas such as environment protection, healthcare, art, education, because by integrating them, we can contribute to sustainable development and improve the standard of living of the citizen around the world. Thank you for your attention.
Moira Whelan:
Thank you very much, Minister. And I’d like to now turn to Mr. Dick Sui Wa, who is the Chairman of Information and Communications Technologies Authority in Mauritius, and ask you the role of ICT regulators, especially in Mauritius have played a collaborative role in creating the framework required to ensure confidence and security. Tell us a little bit about it.
Dick Christophe Ng Sui Wa:
Thank you very much for the question, which is very relevant. I would like to say hello to you all. Bonjour a tous. Good morning, ladies and gentlemen. The main concern for every country and authority that we are here today, government, to ensure confidence and especially security. Security is a major issue for all authority, regulatory authority in the world and all that are here today. Within this collaborative framework, we, the ICT, the Mauritian regulator, we play a central role in ensuring confidence and security in the use of digital technology. We understand emerging cybersecurity challenges and collaborate with its stakeholders to develop policies and regulations that help build trust in cyberspace and in the use of digital technologies. All cyber incidents in the ICT sector represent a global challenge because of an intrinsic cross-border nature. The lack of harmonization across different jurisdictions and the rapid development of emerging technologies should be tackled by the regulator to contribute to the strengthening of national cyber resilience, which with effective measures, which can be replicated at the international level through collaborative platforms. Another important aspect for us, the regulator, is that in order to keep pace with emerging technologies, we, the ICT regulators, must first become technologically savvy in adopting new technologies. It is only then that we will be able to take informed decisions on the regulatory framework required for these new technologies. We have to bear in mind that regulation should not also stifle innovation. In Mauritius, we took… this practical approach. We recently came up with an innovative blockchain-based license verification system, as the risk of forged, fake or invalid ICTA licenses which can be used fraudulently is a reality. To address this problem, we launched this new verification service so as to give added assurance to the different stakeholders and the public using licenses issued by the regulator. Verification systems make use of the smart contracts on the Ethereum blockchain to store cryptographic proof of the ICTA license on the blockchain. These digital documents are tamper-proof documents which prove who issued it. They are the electronic equivalent of what we have, physical documents like passport, ID, driving license and so on. In so doing, we have not only set an example in the use of emerging technology, which is the blockchain one, but with its practical understanding of blockchain technology, it took an informed stand to recommend to the policymaker the necessary relevant legal and regulatory updates to be incorporated in the Electronic Transactions Act of Mauritius with respect to smart contracts. Such an example, which is related to the strengthening of the cybersecurity framework of a country, if escalated and discussed at the level of a collaborative platform, can eventually be considered for adoption in other countries as one standardised cybersecurity best practice measure for emerging technologies. We have also passed many laws. My friend from Namibia has been talking about data protection. We have the Data Protection Act, which dates from 2017. We have passed the Cybercrime and Cybersecurity Act of 2021. We have institutions like most of you in your own countries. We have established the National Cybersecurity Committee, which is a board with all high-level people dealing with cybersecurity to ensure the security of our system. And recently, we have passed a law where we have set up a Mauritius Emerging Technology Council, and we held a conference on a regional level in Mauritius, which, as you know, we are part of the African Union. Thank you very much.
Moira Whelan:
Thank you very much, Chairman. And I’ll turn now to Dr. Jacek Oko, who is the President of the Office of Electronic Communications in Poland. We’ve talked a little bit about the structures and collaboration, and I wonder if you can talk to us a bit about the trust and resilience of these networks in Poland.
Jacek Oko:
Thank you for this question. There are several important aspects of this issue that are relevant. None of them individually is a sufficient condition, but together they are a prerequisite for success in ensuring the operation for a trustworthy and resilient network. First of all, the regulator needs to acquire knowledge. It needs to have a team of people who not only understand the challenges, but they also work closely with the other teams responsible for cybercrisis operations at home, in missing country, on the country level, and in the international, around the world level. Secondly, the very important thing is to have close and direct contact with the network operators at the working level. Not with the people, typical cooperation with a regulator, but contacts with engineers, IT specialists, and system administrations. We managed to build such a team almost four years ago as a part of our ISACS initiative. A team in which we trust each other is very important, trust each other, and where our participants benefit from its activities. Practically, when we test it, when they broke up the war in Ukraine, the network operators, with the assistance of a regulator, organized a very good network for the over a million people, the refugees from Ukraine, when they came to Poland during seven, ten days. We rapidly organized a very good existing network for them. The third is important for the regulator to be an activity in R&D projects related to the security and resilience of the telecommunications network. An example is the 5G tactics program with a budget over 5 million euros, where we are focusing on the issue of cyber security and trusting 5G networks together with colleagues from several countries, from several organizations, small and medium enterprises, network operators, vendors, and regulators. We together prepare the environment for our open-run security and equipment services, secure and be secure in the 5G network, based on open-run, very important for small companies and I think for the people, solution. The fourth, the last but not least, of course, is we should remember about the fact that the larger operators have the budgets for dealing with streets and outages in their own network. But what about with SMEs, small and medium enterprises as operators? We cannot forget about this kind of organization and the role of a regulator is to help these operators, small and medium operators, to provide recommendations, historical experience, exams, and the way how to create a successful way to mitigation of risk. Thank you for your attention.
Moira Whelan:
Thank you very much. And I’ll move now to Mr. Dan Sjöblom, who is the Director General of the Swedish Post and Telecom Authority. We’ve heard about some specific examples so far of threats and challenges, but I’m wondering if you can talk to us a bit about spoofing, which is one way to commit cyber crimes such as fraud. What is the Swedish Post and Telecom Authority doing to prevent this type of cyber crime?
Dan Sjoblom:
Good morning and thank you for the question. Yes, PTS has recently put in place some recommendations for the Swedish telecom operators regarding spoofing, and the recommendation is to block fixed Swedish phone numbers used from abroad as a means to commit fraud. And we are also working to take the recommendation into legally binding rules for the telecom operators on the issue. The telecom operators are very positive to having these recommendations to have clarity. We have seen them since they put the recommendations in place. A lot of numbers and thereby attempts of fraud have been blocked. Now turning to mobile numbers used abroad for roaming, which is legitimate. They are also used to commit fraud from abroad, and there it’s a little bit more technically challenging. We are working with the operators on implementing new technology to be able to block also those attempts. I should say that PTS has an assignment from government on a wider perspective of fraud issues. We are now currently mapping how electronic communication services are being used to commit fraud, and we are going by the end of the year to propose actions on a broader scale to prevent such attempts. One issue in particular that we are looking at is regarding SMS, the alphanumeric sender ID, which as most of you probably know can be altered quite easily and can and is being used to mislead recipients about the source of the SMS, where it can fraudulently indicate that it has been sent by your bank or by an authority. And of course ensuring confidence and security in the use of digital technologies is really important. We have to make sure that everyone has the trust in the systems to take part in the digital society, and we’re doing this not alone, but as a societal multi-stakeholder cooperation. No one can make everything, but everyone has a place to collaborate, and I wanted to mention that we at PTS from this year host a collaborative platform, Digital Today, and the goal of this platform is to inspire everyone to be willing and able to take part in the digital society. Last year we had 375 partners from all sectors of society, and our goal for this year is to ensure that 1 million out of 10 million Swedes get some at some development of the digital skills, and that we have events taking place in all of our 290 municipalities. Thank you.
Moira Whelan:
Thank you very much. And I think that last element of participation of people leads us to our final panelist, Andrew Sullivan, who’s the President and CEO of the Internet Society, as our representative here on the panel of the CSO community, and I’m wondering if you can talk to us about those real-life examples of collaboration and how you see, as the regulators have said, we can bolster trust and resilience in the Internet.
Andrew Sullivan:
Sure, thanks very much. I think one of the critical things about this is that the Internet is made up of so many different networks, and so you have to get everybody to participate. And I was going to talk, first of all, about one particular example that has been quite important, is the Mutually Agreed Norms for Routing Security, or MANRS, which was an initiative that was originally fostered by the Internet Society about 10 years ago. We started with, I believe, nine participants. We’ve got like a thousand who ended up working in this effort. And what it really comes down to is the means by which the different networks agree to the ways in which they’re going to interoperate, agree in which the ways that they’re going to increase the security, and then everybody becomes more able to depend on the fundamental routing security of the Internet. And this is, you know, a mysterious underlying bit of routing stuff that most people don’t need to know about. It would be very boring for an ordinary person to get into understanding all of the details of the routing system. But what was good for them is to know, hey, this is actually a system that people rely on with one another. It depends on open protocols that everybody can depend on, so you can validate these kinds of things. And that validation then allows the various routing systems to do these things automatically, and that’s how we get security on the Internet, you know, that these systems depend on one another. But there is another one that has occurred to me as people were speaking this morning that I wanted to mention, and that is actually the resilience of the network, which is another piece of trust, right? You can only trust the network if you can also depend on it. And the topic of cable cuts has come up several times today, and I just wanted to note that one of the things that has happened is that the systems are able to rely on one another when they do good peering, and they do that good peering because they can depend on this kind of mutually agreed norms like MANRS produces. So we have the pattern that we should be building upon, which is getting all of the various kinds of people who are operating on the Internet involved in those decisions, involved in making sure that the system is fundamentally reliable with one another, get the good peering at Internet exchange points and so on, and then you have a much more resilient and much more reliable network that we can all depend upon.
Moira Whelan:
That’s great. Thank you very much. And I think we have, I think we potentially have a WSIS first, which is two minutes left for additional comments by anyone on our panel if they would like to weigh in with other examples. Anyone? Okay. I’m being told we’re actually going to stop, but thank you very much to everyone. I think, just thank you to WSIS. Resilience and trust is really the intangible thing at the core of the technology and the mechanisms that we speak about in our everyday life, so that’s what WSIS brings us is this collaboration. So thank you to panelists. This will be summarized and submitted to the chair at the end of WSIS on Thursday. Thank you very much.
Speakers
A
Andrew Sullivan
Speech speed
192 words per minute
Speech length
474 words
Speech time
148 secs
Report
The Internet, with its complex web of interconnected networks, requires a robust security and reliability framework. The Mutually Agreed Norms for Routing Security (MANRS) has been at the forefront of this endeavour since its inception by the Internet Society some ten years ago.
Starting with just nine members, it has expanded to a network of over one thousand participants, a testament to its increasing significance. MANRS is pivotal in setting standardised protocols, thereby enabling various networks to agree on procedures to enhance both interoperability and security measures.
Such agreements are critical for the foundations of Internet routing security – a subject obscure to the average person but crucial for the stability and reliability of online services. Trust is a central element within this network framework, encompassing not only security but also resilience – the network’s capacity to stay operational amidst challenges, such as cable cuts.
Effective peering, where networks exchange traffic directly, relies on trust in these shared protocols as put forward by MANRS. Insights from recent discussions have shed light on network resilience and its reliance on trustworthy peering arrangements at Internet exchange points.
Peering agreements, guided by MANRS standards, enable networks to manage and recover from infrastructure damage like cable cuts effectively, thus ensuring a resilient Internet infrastructure. The discourse highlights the necessity for broadband engagement among all Internet community members, including operators and stakeholders, in both decision-making and the implementation of principles that establish a fundamental level of operational trust.
Through MANRS, there is an emerging pattern of best practice that likely will function as a model for initiatives aiming to foster a resilient, trusted, and reliable Internet ecosystem. In summary, adherence to shared norms and maintaining good peering relationships are essential not only for the Internet’s current functioning but also for reinforcing the infrastructure against future digital challenges.
This sense of interdependency through mutual norms and reputable peering is critical for the resilience and reliability of the global Internet infrastructure.
DS
Dan Sjoblom
Speech speed
133 words per minute
Speech length
439 words
Speech time
198 secs
Report
The Swedish Post and Telecom Authority (PTS) has proactively addressed the rise in telecommunications fraud, focusing on countering the spoofing of Swedish fixed-line numbers. Recommendations have been issued to Swedish telecom operators to block these numbers when used fraudulently from abroad.
The intent behind these measures is to reduce the instances of scams targeting Swedish residents, typically orchestrated from outside Sweden. PTS aims to go beyond voluntary guidelines, seeking to establish these measures as mandatory, enforceable rules for the industry. Feedback from the telecom sector on these anti-fraud measures has been positive, with a marked decline in fraud cases evidencing their efficacy.
The challenge remains more significant with mobile numbers due to the legitimate use of roaming services, complicating the task of distinguishing fraudulent activities. In response, PTS is collaborating with providers to deploy advanced technologies that can detect and hinder illegal usage without disrupting legitimate roaming services.
Further extending its mandate, PTS is taking action against fraud using electronic communication services, specifically addressing vulnerabilities in the SMS system that allow sender IDs to be manipulated. Such deceptions, which can mimic trusted entities like banks or authorities, pose a threat to the public’s trust in digital services.
Hence, PTS’s role is instrumental in maintaining the digital ecosystem’s reliability and security. Complement the technical measures, PTS leads ‘Digital Today,’ a platform designed to boost digital literacy and inclusion. The initiative has brought on board 375 partners in the last year, aiming to improve the digital skills of 1 out of 10 Swedes in the current year.
This project prioritises inclusivity, with events spread across all 290 municipalities in Sweden. In summary, the PTS has implemented a comprehensive approach to tackle telecom fraud and promote digital literacy, emphasising the necessity of a society-wide commitment to cybersecurity and digital proficiency.
Through proactive steps, collaborative partnerships, and a push for regulatory strength, the PTS exemplifies a dynamic and preventive stance on safeguarding digital engagement across Sweden. The strategy not only targets emerging security challenges but also fosters widespread digital competence among Swedish citizens.
DC
Dick Christophe Ng Sui Wa
Speech speed
152 words per minute
Speech length
652 words
Speech time
257 secs
Report
At a key conference on digital security, the ICT regulator from Mauritius presented a comprehensive national strategy to ensure digital trust and security. Emphasising the universal nature of cyber threats, the regulator stressed the importance of cyber security for all regulatory bodies around the world, highlighting the necessity for harmonising international cybersecurity efforts and addressing the challenges intensified by the swift advancement of new technologies.
The Mauritian approach includes leveraging blockchain technology, epitomised by the launch of a blockchain-based license verification system aimed at eliminating fraudulent use of ICTA licenses. The system employs Ethereum blockchain’s smart contracts, creating secure, tamper-proof digital credentials comparable to traditional identification documents.
In line with this innovative ethos, Mauritius has proactively updated its legal frameworks, embedding the concept of smart contracts in its Electronic Transactions Act, while ensuring that laws like the Data Protection Act 2017 and the Cybercrime and Cybersecurity Act 2021 support a strong legal infrastructure for cybersecurity.
Organisationally, the establishment of the National Cybersecurity Committee and the Mauritius Emerging Technology Council have been crucial steps, indicating a comprehensive organisational strategy towards cybersecurity in Mauritius. The participation of Mauritius in African Union dialogue and regional technology conferences accentuates its commitment to regional collaboration.
In summary, security in the digital realm is of universal concern, and the ICT regulator from Mauritius reaffirmed the nation’s comprehensive stance on this issue. By adopting innovative technologies such as blockchain for ensuring licence integrity, enhancing their legal infrastructure to support digital advancement, and prioritising national and international cooperation on cybersecurity, Mauritius is aiming to lead by example in the realm of digital trust and security.
This proactive approach reflects Mauritius’s endeavour to carve a niche as a forward-looking, collaborative player on the world stage of cybersecurity.
EI
Emma Inamutila Theofelus
Speech speed
183 words per minute
Speech length
558 words
Speech time
183 secs
Report
The speaker stressed the critical part played by governments in creating trust among citizens to protect their digital rights, especially considering the decreasing public confidence during the COVID-19 pandemic. The previous years have exposed weaknesses in governmental communication and crisis response, which had varying impacts on different societal layers.
A principal issue highlighted by the speaker is the challenge of cybersecurity, which poses a relentless threat worldwide, with Namibia experiencing approximately 2.7 million cyberattacks annually. This alarming statistic showcases the extensive feeling of vulnerability for individuals and businesses active online, calling for immediate enhancement of security protocols.
The speaker proposes a tripartite strategy to tackle these concerns. Firstly, building regular, transparent communication between governments, the populous, and the business community is vital. This would involve candid discussions about government challenges, upcoming intervention plans, and expected public engagement with new policies, aiming to foster a culture of trust and understanding regarding digital security efforts.
Secondly, the speaker pinpoints the necessity for educating citizens about the perils of the digital environment. They note that many lack crucial know-how for safe online navigation and struggle to discern genuine from fraudulent information. Consequently, a government role is to educate on preserving digital identities, circumventing digital hazards prior to necessity for governmental intervention.
Thirdly, the significance of citizen empowerment through enabling people to take charge of their digital safety is underlined, asserting the government’s limited capacity to surveil all cyberspace. Empowerment involves providing individuals with the necessary resources and know-how to tackle cybersecurity dangers proactively.
Supporting this empowerment, the speaker refers to Namibia’s legislative efforts, including an evolving data protection bill, cybercrime bill, and a national cybersecurity strategy, formulated through extensive stakeholder consultation to foster shared responsibility and collective dedication to digital rights. In sum, the speaker advocates a fusion of transparency, education, and empowerment to shield digital rights.
This hybrid method aims to close the gap between government and citizens and proactively combat cyber threats through public knowledge and autonomy, backed by robust legal measures. It’s a multifaceted response essential for addressing modern cyber security complexities.
JO
Jacek Oko
Speech speed
149 words per minute
Speech length
454 words
Speech time
183 secs
Arguments
Knowledge and teamwork are essential for a trustworthy and resilient network.
Supporting facts:
- The regulator needs a team that understands challenges and works with cybercrisis teams.
- The Office of Electronic Communications built such a team under the ISACS initiative.
Topics: Telecommunications, Network Security
Direct contact with network operators’ technical staff is crucial.
Supporting facts:
- Importance of connections with engineers, IT specialists, and system administrators.
- Trust and practical benefits have been established between the regulator and these technical teams.
Topics: Telecommunications, Operational Collaboration
Quick response and adaptation in emergencies are a sign of network resilience.
Supporting facts:
- Network operators rapidly organized a functional network for over a million Ukrainian refugees.
Topics: Crisis Response, Telecommunications
Involvement in R&D is necessary for advancing security and resilience in telecom.
Supporting facts:
- The 5G tactics program focuses on cybersecurity in 5G networks.
- Collaboration involves various stakeholders, such as SMEs, network operators, and vendors.
Topics: R&D, Cybersecurity, 5G Technology
Regulators should support SMEs in strengthening network security and resilience.
Supporting facts:
- Large operators have budgets to manage threats, but SMEs may need regulatory assistance.
- The regulator provides recommendations and historical experience to help SMEs mitigate risks.
Topics: SMEs Support, Telecommunications Regulation
Report
The extended analysis of telecommunications resilience and network security presents a unified standpoint on the criticality of a cooperative, informed, and flexible approach. Regulatory bodies such as the Office of Electronic Communications are at the forefront, having established expert teams pursuant to the ISACS initiative, showcasing their effectiveness in liaising with cyber crisis teams and reinforcing the trustworthiness and security of communication networks.
Operational collaboration is accentuated, underscoring the indispensability of cultivating solid relationships with engineers, IT specialists, and system administrators. The formation of trust and the realisation of practical benefits between technical teams and regulators are pivotal for boosting network resilience. The rapid establishment of a functioning network infrastructure for over a million Ukrainian refugees by network operators serves as a testament to the sector’s capacity for quick adaptability and resilience in the face of crises.
In the realms of research and development (R&D) and cybersecurity, the 5G tactics programme is spotlighted for its focus on protecting the nascent 5G networks. This involves a concerted effort amongst various stakeholders, including SMEs, network operators, and vendors, all of whom are integral to propelling forward the security and resilience of telecommunication infrastructures.
The regulatory sphere plays a supportive role for SMEs that often face financial constraints and are susceptible to security threats compared to larger network entities. By dispensing bespoke advice and drawing upon a wealth of historical insight, regulators can aid SMEs in enhancing their network security and robustness.
Synthesising these insights, Dr. Jacek Oko promotes a comprehensive strategy that emphasises the significance of collaboration, knowledge exchange, and the ability to swiftly adapt within a regulatory context. The rapid response to the Ukrainian refugee situation exemplifies how networks can promptly and efficiently surmount sudden challenges.
The overall analysis reflects a positive perspective on the capacity of telecommunications networks to tackle issues in security, resilience, and crisis reaction. The collaborative and proactive approach across regulatory, operational domains, and the broader R&D community illustrates a dedicated resolve to constant enhancement and readiness—a requisition in the increasingly dynamic digital field.
This summary has been carefully checked for adherence to UK spelling and grammar conventions, including updates to reflect the main points from the analysis accurately and incorporating keywords related to the summary’s theme without compromising its quality.
MD
Marash Dukaj
Speech speed
116 words per minute
Speech length
445 words
Speech time
230 secs
Report
Artificial Intelligence (AI) is a game-changer in addressing complex, global challenges such as economic instability, political upheaval, climatic changes, mass migration, healthcare emergencies, and the demographic issue of an ageing population in Western countries. It brings sophisticated analysis and the capability for anticipatory measures, revolutionising numerous sectors by enhancing workflow automation and efficiency.
By 2024, AI’s presence in everyday life is pronounced, notably in its role in bolstering IT security by analysing extensive datasets to predict and mitigate security threats. Nonetheless, ensuring responsible governance and ethical employment of AI technology remains paramount. Despite its modest size and limited resources, specifically in financial capital and access to skilled professionals, Montenegro recognises the imperative of embracing and contributing to the AI revolution.
The country is committed to developing a strategic approach to position itself in the global move towards advanced AI governance. Montenegro’s strategy focuses on promoting open data accessibility, international cooperation, specialised education, amplified investment in digital projects, and providing incentives to attract IT experts and investors.
In its progression towards enhanced digital capabilities, Montenegro is improving system interoperability, data integrity, and fostering digital literacy among its citizens. The educational system will integrate IT education with core academic subjects, creating a digitally adept workforce equipped for future technology.
Additionally, the strategy includes making the country a welcoming hub for digital nomads and international IT firms. Furthermore, Montenegro aims to foster sustainable partnerships connecting the IT industry, AI innovations, and vital sectors such as environmental preservation, healthcare provision, education, and the creative arts.
This integration is crucial for promoting sustainable development and enhancing the quality of life on a broader scale. In summary, as Montenegro navigates the transformative potential of AI, it is focused on balancing technological advancement with inclusive and sustainable growth.
The nation’s progress towards AI and digital sophistication relies on creating strategic partnerships, establishing sound policies, and collectively advancing digital literacy. By weaving AI into the fabric of societal progress, Montenegro embarks on a holistic journey towards reaping the benefits of AI while upholding the highest ethical standards.
MW
Moira Whelan
Speech speed
171 words per minute
Speech length
735 words
Speech time
257 secs
Report
Moira Whalen, as the Director of Democracy and Technology at the National Democratic Institute, expertly moderated a discussion panel at the World Summit on the Information Society (WSIS) Forum. This session was entitled “Securing the Digital Realm: Collaborative Strategies for Trust and Resilience” and centred on the key issues of internet regulation and cybersecurity, with a specific focus on the intricacies of rule-making.
The opening remarks acknowledged Preetam Mallur from the ITU for their commendable role in the sphere of emerging technology leadership. Namibia’s Minister of Information and Communications Technology, Emma Theophilus, stressed the vital role of governments in fostering trust amongst citizens to safeguard their digital rights and interests, highlighting the importance of governmental oversight in the realm of digital experiences.
Montenegrin Minister of Public Administration Marash Dukaj broached the topic of artificial intelligence, articulating the need to balance the promising prospects and the potential perils AI technologies may pose, underscoring the bijou yet important examinations warranted by emerging technologies. Dick Sui Wa, Mauritius’ ICT Authority Chairman, spoke on the influential part ICT regulators have in reinforcing public trust and strengthening the security foundations in the digital environment, underpinning collaborative efforts to develop supportive frameworks in Mauritius.
From Poland, Dr. Jacek Oko, President of the Office of Electronic Communications, detailed the measures his country has taken to shore up the trustworthiness and reliability of their digital networks—a crucial factor for a resilient telecommunication infrastructure in the face of increasing cyber threats.
Dan Sjöblom, Director General of the Swedish Post and Telecom Authority, lent a Scandinavian angle to the issue, concentrating on the cyber threat of spoofing. He briefed attendees on Sweden’s prevention strategies for combatting spoof-related cybercrime, contributing to a more secure digital landscape.
Andrew Sullivan, representing the civil society sector as President and CEO of the Internet Society, delineated examples of successful collaboration and potential avenues for fortifying trust and resilience between regulators and CSOs within the digital sphere. Although an opportunity for further commentary was presented at the session’s conclusion, it remained unutilized.
Moira Whalen succinctly encapsulated the proceedings, emphasising the paramount importance of collaborative efforts to foster trust and resilience—the hallmark of the WSIS Forum’s objectives. These rich discussions are set to be compiled comprehensively and presented to the chair of the WSIS Forum, ensuring the panel’s perspectives are both preserved and integrated into wider deliberations concerning the protection and governance of the digital domain.
PM
Preetam Maloor
Speech speed
158 words per minute
Speech length
409 words
Speech time
155 secs
Report
The analysis provides a thorough examination of the shifting landscape of Internet use and the escalating challenge of cybercrime, contrasting the scenarios between 2005 and 2024. At the 2005 World Summit on the Information Society, the online community totalled just 1 billion users, with mobile phones chiefly used for voice calls and text messaging.
Even at that early stage, cybercrime posed a significant threat, costing the global economy an estimated $400 billion. Fast forward to 2024, and there has been a monumental shift in digital engagement, with Internet users increasing fivefold to 5.4 billion. This surge in technological adoption has been mirrored by a sharp increase in cybercrime, with the frequency of annual cyber attacks soaring by 80% and an incident occurring every 36 seconds.
The economic repercussions of cybercrime have skyrocketed, inflating by more than 20 times to reach a staggering $8 to $11 trillion. The costs reflect the heightened sophistication and scale of the cyber threats that now cast a shadow over the digital world. The analysis further delves into the rise of complex legal and ethical issues concerning privacy and human rights, triggered by the global shift to a digitally-centric society.
The advent of sophisticated AI-driven cyber threats and the immediate need to address vulnerabilities in light of impending quantum computing developments underscore the advanced nature of today’s cyber threats. Moreover, the aspect of resilience has broadened to include the physical aspects of our infrastructure, highlighting the importance of protecting subsea cables, satellite communications, and terrestrial networks against cyber attacks.
There’s a silver lining in the form of the international community’s response to these challenges. Member states are progressively acknowledging their pivotal role in countering cyber threats. This is evident from the advancement shown by the ITU Global Cybersecurity Index, with the number of countries without national cybersecurity standards decreasing from 128 to 88 and those lacking a national cybersecurity strategy dropping from 110 to 67 between 2017 and 2024.
This engagement in enhancing cybersecurity measures reveals a global move towards understanding the severity of cybercrime and fostering increased collaboration to tackle it. The ITU, as an Action Line C5 facilitator, has taken a central role in supporting global dialogues and initiatives aimed at reinforcing cyber resilience.
Their contribution could signify the emergence of stronger international cybersecurity policies and concerted actions among nations. The shift towards more robust cybersecurity measures around the globe offers a hopeful perspective as Internet integration intensifies in every aspect of life, and cyber threats become increasingly formidable.
The analysis paints a picture of a world growing more conscious of the colossal challenges posed by cybercrime and more cooperative and equipped to mount a formidable cyber defence.
Related event
World Summit on the Information Society (WSIS)+20 Forum High-Level Event
27 May 2024 - 31 May 2024
Geneva, Switzerland and online